[1] |
Xiang GONG, Tao FENG, Jinze DU.
Formal modeling and security analysis method of security protocol based on CPN
[J]. Journal on Communications, 2021, 42(9): 240-253.
|
[2] |
Rongna XIE,Yunchuan GUO,Fenghua LI,Guozhen SHI,Yaqiong WANG,Kui GENG.
Extended access control mechanism for cross-domain data exchange
[J]. Journal on Communications, 2019, 40(7): 67-76.
|
[3] |
Bo MENG,Xudong HE,Jinli ZHANG,Lili YAO,Jintian LU.
Security analysis of security protocol Swift implementations based on computational model
[J]. Journal on Communications, 2018, 39(9): 178-190.
|
[4] |
Qi-ying WU,Jian-feng MA,Hui LI,Jun-wei ZHANG,Qi JIANG,Yin-bin MIAO.
Multi-keyword search over encrypted data with user revocation
[J]. Journal on Communications, 2017, 38(8): 183-193.
|
[5] |
Wen GU,Ji-hong HAN,Lin YUAN.
SSMCI:verification mechanism for security protocols centered on the attacker
[J]. Journal on Communications, 2017, 38(10): 175-188.
|
[6] |
Bin ZHAO,Jing-sha HE.
Bayes decision theory based risk minimization authorization mapping
[J]. Journal on Communications, 2015, 36(Z1): 157-161.
|
[7] |
Jing YANG,Dan FAN,Yu-qing ZHANG.
Adjusted automata learning algorithm for security protocol adaptive model checking
[J]. Journal on Communications, 2015, 36(Z1): 266-276.
|
[8] |
.
Towards session identification using principal
behavior for multi-party secure protocol
[J]. Journal on Communications, 2015, 36(11): 190-200.
|
[9] |
Chun-xiang GU,Huan-xiao WANG,Yong-hui ZHENG,Dan XIN,Nan LIU.
SAT-based lazy formal analysis method for security protocols
[J]. Journal on Communications, 2014, 35(11): 117-125.
|
[10] |
.
SAT-based lazy formal analysis method for security protocols
[J]. Journal on Communications, 2014, 35(11): 13-116.
|
[11] |
.
New remote authorization protocol for vehicle diagnosis
[J]. Journal on Communications, 2014, 35(11): 17-154.
|
[12] |
.
SIM: a secure IP protocol for MANET
[J]. Journal on Communications, 2013, 34(Z1): 15-125.
|
[13] |
.
Analysis and improvement for authentication protocols ofmobile ad hoc network with CSP approach
[J]. Journal on Communications, 2013, 34(Z1): 8-66.
|
[14] |
Rong-sen LI,Wen-hua DOU.
SIM: a secure IP protocol for MANET
[J]. Journal on Communications, 2013, 34(Z1): 116-125.
|
[15] |
Li-cai LIU,Li-hua YIN,Yun-chuan GUO,Yan SUN.
Analysis and improvement for authentication protocols of mobile ad hoc network with CSP approach
[J]. Journal on Communications, 2013, 34(Z1): 58-66.
|